• Skip to main content

ITSecurity.org

Technology Security Controls

  • Main
  • Products
  • Services
    • Compliance-Services
      • ISO27001 Compliance
      • ISO22301 Compliance
      • ISO27002 Compliance
      • Data-Protection
      • GDPR
      • PCI-DSS Services
    • Identity and Access Management Services
      • IAM Design
      • IAM Policies & Standards
    • Incident Management Services
      • Emergency Incident Response
      • Forensic Support
      • Incident Response
    • Information Security Services
      • Information Security Consultancies
      • Information Security Governance Services
      • Information Security Policies & Standards
    • IT Risk Management Services
      • Risk Management Framework
      • Auditing
    • IT Security Consulting Services
      • IT Security Governance Services
      • IT Security Policies and Standards
    • Additional Security Services
      • Managed Security Services
      • Mobile Security
      • Network Security Services
    • Physical Security Services
      • Physical Security Reviews
    • Policies and Standards Services
    • Programme and Project Services
    • Risk Management Services
      • Risk Management – Framework
      • Risk Management Acceptance & Waivers
    • Security Awareness Services
      • Security Awareness – Phishing Responses
      • Phishing Responses
      • Security Awareness Training – Rebranded Security Training
      • Security Awareness Training – Generic
    • Security Design Services
      • All Security Design and Architectural Services
      • Cloud Security Review
      • Security Appliance Design and Configuration
    • Security Metrics Services
    • Technical Security Assessment Services
      • Penetration Testing – Our Penetration Test Services
      • Database Security – Databases and Repositories
      • Application Security Code Testing
      • Application Security Services
    • Third-Party and Supplier Assurance Services
      • Third and Supplier Party Assurance Methodology
      • Third and Supplier Party Assurance Review
      • Joint Venture Due Diligence
  • Security Digest
  • FAQ
  • Contact Us

IT Security

Weekly Threat Report 8th January 2021

January 8, 2021 by admin

The NCSC’s weekly threat report is drawn from recent open source reporting.

Filed Under: IT Security

Erasing personal data from second-hand devices

December 28, 2020 by admin

Introducing our new guidance: essential steps to follow when you’re buying (or selling) used electronic devices

Filed Under: IT Security

Buying and selling second-hand devices

December 28, 2020 by admin

How to erase the personal data from your phone, tablets, and other devices (and why it’s important when you’re buying and selling them).

Filed Under: IT Security

Critical Flaws Put Dell Wyse Thin Client Devices at Risk

December 23, 2020 by ITSecurity.Org Ltd

Researchers: Vulnerabilities Could Allow Remote Code Execution, Files Access
Researchers at CyberMDX have uncovered two significant vulnerabilities in certain Dell Wyse thin client devices that, if exploited, could allow threat actors to remotely run malicious code and access files on affected devices.

Filed Under: IT Security

EU Launches Decryption Tool for Law Enforcement

December 23, 2020 by ITSecurity.Org Ltd

Move Seen as Alternative to Weakening Encryption
Europol, the European Union’s law enforcement agency, and the European Commission are launching a new decryption platform to help law enforcement agencies decrypt data that has been obtained as part of a criminal investigation, a move seen as an alternative to weakening encryption.

Filed Under: IT Security

Police Dismantle Cybercrime ‘Bulletproof Hosting Service’

December 23, 2020 by ITSecurity.Org Ltd

Authorities Shut Down VPN That Supported Illegal Operations
The FBI, Europol and other law enforcement agencies shut down a virtual private network Tuesday that was providing a “bulletproof hosting service” that allowed cybercriminals to conduct illegal operations, including ransomware attacks, while remaining hidden from police.

Filed Under: IT Security

Other Tech Firms Back Facebook’s Lawsuit Against NSO Group

December 23, 2020 by ITSecurity.Org Ltd

Microsoft, Google, Cisco and VMware File a Brief in Spyware Case
Several tech giants, including Microsoft, Google, Cisco and VMware, have filed a brief backing Facebook’s lawsuit against Israel-based spyware firm NSO Group, which has been accused of hacking into Facebook-owned WhatsApp’s instant messaging app to enable spying by the company’s clients.

Filed Under: IT Security

Hong Kong’s Hutchison Group, which runs mobile carrier ‘3’, protests as USA puts it on new China ban list

December 23, 2020 by ITSecurity.Org Ltd

Trump administration is behind the times: used old name for Chinese company Hutchison sold ages ago

The CK Hutchison Group, the Hong-Kong-based conglomerate that operates the “3” mobile brand and maintains plenty of other telecoms investments, wants to clear its name after it appeared on a new list of companies the USA designates as military end users to which US companies cannot export.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

  • Page 1
  • Page 2
  • Page 3
  • …
  • Page 440
  • Next Page »